We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 10,000 results
  1. Privileged Access Management (PAM)

    Privileged Access Management (PAM) is a subdiscipline within the Identity and Access Management framework. PAM can be implemented and can operate on...
    Morey J. Haber, Darran Rolls in Identity Attack Vectors
    Chapter 2024
  2. Reinvent Cloud Software Stacks for Resource Disaggregation

    Due to the unprecedented development of low-latency interconnect technology, building large-scale disaggregated architecture is drawing more and more...

    Chen-** Wang, Yi-Zhou Shan, ... Hui-Min Cui in Journal of Computer Science and Technology
    Article 30 September 2023
  3. Power-time resource allocation for downlink SWIPT-assisted cooperative NOMA systems

    We study a downlink cooperative non-orthogonal multiple access (NOMA) system in which a base station (BS) serves two paired users on the same...

    Chengpeng Liu, Lin Zhang, ... Shaoqian Li in Science China Information Sciences
    Article 20 April 2023
  4. Predictive resource allocation and VNF deployment using ensemble learning

    Network function virtualization allows the implementation of network services on readily available commercial off-the-shelf servers. A primary...

    Sudha Dubba, Shreyansh Gupta, Balaprakasa Rao Killi in Multimedia Tools and Applications
    Article 07 March 2024
  5. QoS-Aware Computational Resource Allocation

    Recently, the boosting growth of computation-heavy applications raises great challenges for the Fifth Generation (5G) and future wireless networks....
    Chapter 2023
  6. Research Data with Open Access in Foreign Information Systems

    Abstract

    The results are presented of the analysis of 214 foreign current research information systems (–CRISs) as basic resources reflecting the...

    Article 01 December 2023
  7. Virtual Network Function Development for NG-PON Access Network Architecture

    Modern networks urge agility, flexibility, and capacity to cope with the growing demand for media content and applications increasingly oriented...

    Igor Araújo, André Brízido, Solange Rito Lima in Journal of Network and Systems Management
    Article Open access 22 August 2023
  8. Blockchain-based collaborative business process data sharing and access control

    To solve the problems of large-scale data storage and reliable access control in blockchain-based collaborative business process executions with...

    **aoxiao Sun, Yijie Wei, Hujun Shen in Journal of Reliable Intelligent Environments
    Article 02 November 2023
  9. Data Access

    In this chapter, you will learn how Spring can simplify your database access tasks (Spring can also simplify your NoSQL and BigData tasks, which is...
    Marten Deinum, Daniel Rubio, Josh Long in Spring 6 Recipes
    Chapter 2023
  10. Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning

    KubeEdge is an open-source system extending native containerized application orchestration and device management to hosts at the edge. One of the...

    Sadananda Lingayya, Sathyendra Bhat Jodumutt, ... Senthilkumar Chandrasekaran in Cluster Computing
    Article 22 April 2024
  11. Blockchain based authentication and access control protocol for IoT

    The integration of various advancements, ongoing management, intellectual capacity, item sensors, and incorporated frameworks have all contributed to...

    Akanksha Singh, Harish Chandra, ... Deepak Chhikara in Multimedia Tools and Applications
    Article 14 November 2023
  12. Blockchain-enabled IoT access control model for sharing electronic healthcare data

    Deploying the Internet of Things (IoT) in the transfer of enormous medical data often promotes challenges with the security, confidentiality, and...

    Benkhaddra Ilyas, Abhishek Kumar, ... Hang Lei in Multimedia Tools and Applications
    Article 29 April 2024
  13. From Vision to Evaluation: A Metrics Framework for the ACCESS Allocations Service

    The Allocations Service for the Advanced Cyberinfrastructure Coordination Ecosystem: Services & Support (ACCESS) program is charged with accepting,...

    David L. Hart, Stephen L. Deems, Laura T. Herriott in SN Computer Science
    Article Open access 25 April 2024
  14. A family of truthful mechanisms for resource allocation with multi-attribute demand in mobile edge computing

    We address the problem of resource allocation with multi-attribute demand considering heterogeneous servers in mobile edge computing (MEC). A mobile...

    ** Liu, Jun Liu, ... **g Dong in Cluster Computing
    Article 31 May 2024
  15. A knowledge graph empowered online learning framework for access control decision-making

    Knowledge graph, as an extension of graph data structure, is being used in a wide range of areas as it can store interrelated data and reveal...

    Mingshan You, Jiao Yin, ... Elisa Bertino in World Wide Web
    Article Open access 23 June 2022
  16. Modeling and enforcing access control policies in conversational user interfaces

    Conversational user interfaces (CUIs), such as chatbots, are becoming a common component of many software systems. Although they are evolving in many...

    Elena Planas, Salvador Martínez, ... Jordi Cabot in Software and Systems Modeling
    Article Open access 22 November 2023
  17. A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions

    Secret sharing schemes play a vital role in securely distributing a secret among multiple participants, ensuring confidentiality and access control....

    Bhawana Parihar, Arjun Singh Rawat, Maroti Deshmukh in The Journal of Supercomputing
    Article 30 April 2024
  18. Low-Resource Machine Translation Training Curriculum Fit for Low-Resource Languages

    We conduct an empirical study of neural machine translation (NMT) for truly low-resource languages, and present a training curriculum fit for cases...
    Garry Kuwanto, Afra Feyza Akyürek, ... Derry Wijaya in PRICAI 2023: Trends in Artificial Intelligence
    Conference paper 2024
  19. Real-Time Challenges and Opportunities for an Effective Resource Management in Multi-cloud Environment

    As the usage of multi-cloud setups grows, resource management will become a major concern. Because of the dynamic nature of these environments, as...

    H. Anwar Basha, B. H. Anilkumar, ... Sunil Manoli in SN Computer Science
    Article 27 January 2024
  20. Encryption with access policy and cloud data selection for secure and energy-efficient cloud computing

    With the rapid advancements in technology, cloud computing has emerged as a prominent paradigm for efficient data storage and processing. However,...

    M. Indrasena Reddy, P. Venkateswara Rao, ... Srinivasa Reddy K in Multimedia Tools and Applications
    Article 18 July 2023
Did you find what you were looking for? Share feedback.